CVE-2016-7162
moderate-risk
Published 2016-09-26
The _g_file_remove_directory function in file-utils.c in File Roller 3.5.4 through 3.20.2 allows remote attackers to delete arbitrary files via a symlink attack on a folder in an archive.
Do I need to act?
~
1.2% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.5/10
High
NETWORK
/ LOW complexity
Affected Products (20)
File Roller
File Roller
File Roller
File Roller
File Roller
File Roller
File Roller
File Roller
File Roller
File Roller
File Roller
File Roller
File Roller
File Roller
File Roller
File Roller
File Roller
File Roller
Affected Vendors
References (14)
Third Party Advisory
http://ftp.gnome.org/mirror/gnome.org/sources/file-roller/3.20/file-roller-3.20....
Third Party Advisory
http://www.securityfocus.com/bid/92896
Third Party Advisory
http://www.ubuntu.com/usn/USN-3074-1
Third Party Advisory
http://ftp.gnome.org/mirror/gnome.org/sources/file-roller/3.20/file-roller-3.20....
Third Party Advisory
http://www.securityfocus.com/bid/92896
Third Party Advisory
http://www.ubuntu.com/usn/USN-3074-1
49
/ 100
moderate-risk
Severity
26/34 · High
Exploitability
3/34 · Minimal
Exposure
20/34 · Moderate